{"?xml":{"@version":"1.0"},"edm:RDF":{"@xmlns:dc":"http://purl.org/dc/elements/1.1/","@xmlns:edm":"http://www.europeana.eu/schemas/edm/","@xmlns:wgs84_pos":"http://www.w3.org/2003/01/geo/wgs84_pos","@xmlns:foaf":"http://xmlns.com/foaf/0.1/","@xmlns:rdaGr2":"http://rdvocab.info/ElementsGr2","@xmlns:oai":"http://www.openarchives.org/OAI/2.0/","@xmlns:owl":"http://www.w3.org/2002/07/owl#","@xmlns:rdf":"http://www.w3.org/1999/02/22-rdf-syntax-ns#","@xmlns:ore":"http://www.openarchives.org/ore/terms/","@xmlns:skos":"http://www.w3.org/2004/02/skos/core#","@xmlns:dcterms":"http://purl.org/dc/terms/","edm:WebResource":[{"@rdf:about":"http://www.dlib.si/stream/URN:NBN:SI:doc-TEX32OMQ/6f382d1d-1d1c-4b97-b010-91a1fa65fefe/PDF","dcterms:extent":"884 KB"},{"@rdf:about":"http://www.dlib.si/stream/URN:NBN:SI:doc-TEX32OMQ/03b217ff-c3b1-4b14-b71c-f3fa86a424ad/TEXT","dcterms:extent":"62 KB"}],"edm:TimeSpan":{"@rdf:about":"1977-2026","edm:begin":{"@xml:lang":"en","#text":"1977"},"edm:end":{"@xml:lang":"en","#text":"2026"}},"edm:ProvidedCHO":{"@rdf:about":"URN:NBN:SI:doc-TEX32OMQ","dcterms:isPartOf":[{"@rdf:resource":"https://www.dlib.si/details/URN:NBN:SI:spr-EE5UIE2V"},{"@xml:lang":"sl","#text":"Informatica (Ljubljana)"}],"dcterms:issued":"2006","dc:creator":["Macedo Mourelle, Luiza de","Nedjah, Nadia"],"dc:format":[{"@xml:lang":"sl","#text":"številka:1"},{"@xml:lang":"sl","#text":"letnik:30"},{"@xml:lang":"sl","#text":"str. 111-129"}],"dc:identifier":["ISSN:0350-5596","COBISSID:19733031","URN:URN:NBN:SI:doc-TEX32OMQ"],"dc:language":"en","dc:publisher":{"@xml:lang":"sl","#text":"Slovensko društvo Informatika"},"dc:subject":[{"@xml:lang":"sl","#text":"komunikacijski sistemi"},{"@xml:lang":"sl","#text":"kriptografija"},{"@rdf:resource":"http://www.wikidata.org/entity/Q8789"}],"dcterms:temporal":{"@rdf:resource":"1977-2026"},"dc:title":{"@xml:lang":"sl","#text":"A review of modular multiplication methods and respective hardware implementations|"},"dc:description":{"@xml:lang":"sl","#text":"Generally speaking, public-key cryptographic system consist of raising elements of some group such as GF(2n), Z/NZ or elliptic curves, to large powers and reducing the result modulo some given elements. Such operation is often called modular exponentiation and is performed using modular multiplications repeatedly. The practicality of a given cryptographic system depends heavily on how fast modular exponentiations are performed. Consequently, it also depends on how efficiently modular multiplications are done as thee are at base of the computation. This problem has received much attention over the years. Software as well as hardware efficient implementation were proposed. However, the results are scattered through the literature. In this paper we survey most known and recent methods for efficient modular multiplication, investigating and examining their strengths and weaknesses. For each method presented, we provide and adequate hardware implementation"},"edm:type":"TEXT","dc:type":[{"@xml:lang":"sl","#text":"znanstveno časopisje"},{"@xml:lang":"en","#text":"journals"},{"@rdf:resource":"http://www.wikidata.org/entity/Q361785"}]},"ore:Aggregation":{"@rdf:about":"http://www.dlib.si/?URN=URN:NBN:SI:doc-TEX32OMQ","edm:aggregatedCHO":{"@rdf:resource":"URN:NBN:SI:doc-TEX32OMQ"},"edm:isShownBy":{"@rdf:resource":"http://www.dlib.si/stream/URN:NBN:SI:doc-TEX32OMQ/6f382d1d-1d1c-4b97-b010-91a1fa65fefe/PDF"},"edm:rights":{"@rdf:resource":"http://rightsstatements.org/vocab/InC/1.0/"},"edm:provider":"Slovenian National E-content Aggregator","edm:intermediateProvider":{"@xml:lang":"en","#text":"National and University Library of Slovenia"},"edm:dataProvider":{"@xml:lang":"sl","#text":"Slovensko društvo Informatika"},"edm:object":{"@rdf:resource":"http://www.dlib.si/streamdb/URN:NBN:SI:doc-TEX32OMQ/maxi/edm"},"edm:isShownAt":{"@rdf:resource":"http://www.dlib.si/details/URN:NBN:SI:doc-TEX32OMQ"}}}}